Page 107 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 107

METODI HADJI-JANEV:  HYPER THREATS TO CRITICAL INFRASTRUCTURES IN THE REGION OF SOUTH-EASTERN EUROPE:
                        A WAKE-UP CALL FOR SOUTH-EASTERN EUROPEAN LEADERSHIP

            7  References

            1.  Ackerman K. Robert, (February 8, 2018), “Hyperwar Is Coming Faster Than You Think”, Signal
               AFCEA, accessed at: https://www.afcea.org/content/hyperwar-coming-faster-you-think
            2.  Alic, Anes, (November 01, 2011), III-Planned terror attack on US Embassy in Sarajevo, ISA Intel,
               available at: . http://www.isaintel.com/2011/11/01/ill-planned-terror-attack-on-us-embassy-in-
               sarajevo/
            3.  Allen R. John & Hussain Amir, (July 10, 2017), “On Hyperwar” Fortuna’s Corner, accessed at:
               https://fortunascorner.com/2017/07/10/on-hyper-war-by-gen-ret-john-allenusmc-amir-hussain/,)
            4.  Badie Bertrand, (2012), “Transnationalizing Diplomacy and Global Governance” in Kerr, Pauline
               & Wiseman, Geoffrey, (Eds.) Diplomacy in a Globalized world, Theories and Practices. Oxford
               University Press.
            5.  Barton Tim, (2019), “AI offers the ability to reduce the cognitive burden on soldiers”, Video
               interview with Sarah Sicarrd, C4ISRNET, accessed at: https://www.defencenews.com/vid-
               eo/2019/10/21/ai-offers-the-ability-to-reduce-the-cognitive-burden-on-soldiers/
            6.  BBC, (June 27, 2010), “One Killed In Central Bosnia Bombing”, BBC News, retrieved February
               2, from: http://www.bbc.co.uk/news/10428626
            7.  BBC, (July 19, 2012), Bulgaria Blast, Suicide bomber kills Israeli, BBC News, available at: http://
               www.bbc.co.uk/news/world-europe-18897772
            8.  Berteau David, (May 15, 2018), “More signs pointing to AI’s growth in the federal market,” Wash-
               ington Technology, accessed at: https://washingtontechnology.com/articles/2018/05/15/insights-
               berteau-ai-trends-opportunity.aspx
            9.  Best L. Katharina, Schmid Jon, Tierney Shane, Awan Jalal, Beyene M Nahom, Holliday A. May-
               nard, Khan Raza, Lee Karen, (2020) How to Analyze the Cyber Threat from Drones, RAND, ac-
               cessed at: https://www.rand.org/pubs/research_reports/RR2972.html
            10. Bodansky Yossef, (2001), Bin Laden: The Man Who Declared War on America. New York: Forum.
            11. Bostrom Nick, (February 09, 2017), “Strategic Implications of Openness in AI Development”, Wi-
               ley Online Library, accessed at: https://onlinelibrary.wiley.com/doi/full/10.1111/1758-5899.12403

            12. Bur Jessie, (November 29, 2017), “IoT is changing the meaning of ‘critical infrastructure’”, Fed-
               eral Times, accessed at: https://www.federaltimes.com/smr/cybercon/2017/11/29/iot-is-changing-
               the-meaning-of-critical-infrastructure/
            13. Chery Steve, (October 10, 2010), “How Stuxnet will rewrite the cyberterrorim playbook”, accessed
               at: http://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-
               playbook
            14. Cyber edu, (2007), “Critical Infrastructure Protection Defined and Explained” accessed at: https://
               www.forcepoint.com/cyber-edu/critical-infrastructure-protection-cip

            15. Czarny Benny, (January 31, 2020), “ Embracing a Prevention Mindset to Protect Critical Infra-
               structure”, DarkReading, accessed at: https://www.darkreading.com/vulnerabilities---threats/
               embracing-a-prevention-mindset-to-protect-critical-infrastructure-/a/d-id/1336907

            16. Dormehl Luke, (September 11, 2018), “The history of drones in 10 milestones” Digital Trends,
               accessed at https://www.digitaltrends.com/cool-tech/history-of-drones/
            17. Dimitrioska, Pandorce (April 13, 2012), Five murdered at Iron Lake, There are no suspects, (Origi-
               nal: петтмина убиени кај Железарското Езеро, Осомничени нема), Alfa TV, available at: http://
               www.time.mk/read/85fe05db07/a5bc958d44/index.html


                                                                                    107
   102   103   104   105   106   107   108   109   110   111   112